[PULL][Xenial SRU] Mount updates for snaps in lxd containers
Seth Forshee
seth.forshee at canonical.com
Fri Dec 9 21:15:00 UTC 2016
BugLink: http://bugs.launchpad.net/bugs/1634964
Resending this series. It had been applied previously but had to be
reverted due to including an upstream commit which caused a regression
in lxd. A new lxd has been released in xenial which contains a fix for
the regression, so we can now reapply these patches.
Original pull request:
https://lists.ubuntu.com/archives/kernel-team/2016-October/080606.html
Thanks,
Seth
The following changes since commit 465797c39771cd0d3ac34a6d48d415ad7f12343c:
UBUNTU: Ubuntu-4.4.0-55.76 (2016-12-08 14:35:14 +0000)
are available in the git repository at:
git://git.launchpad.net/~sforshee/+git/ubuntu-xenial lp1634964
for you to fetch changes up to 565b99a1f1112d7f631b9e4697aa5fc3b5ddbcda:
UBUNTU: SAUCE: (namespace) fuse: Allow user namespace mounts by default (2016-12-09 14:03:40 -0600)
----------------------------------------------------------------
Eric W. Biederman (8):
(namespace) mnt: Move the FS_USERNS_MOUNT check into sget_userns
(namespace) vfs: Verify acls are valid within superblock's s_user_ns.
(namespace) vfs: Don't modify inodes with a uid or gid unknown to the vfs
(namespace) vfs: Don't create inodes with a uid or gid unknown to the vfs
(namespace) quota: Ensure qids map to the filesystem
(namespace) quota: Handle quota data stored in s_user_ns in quota_setxquota
(namespace) dquot: For now explicitly don't support filesystems outside of init_user_ns
UBUNTU: SAUCE: (namespace) fs: Allow superblock owner to change ownership of inodes
Seth Forshee (13):
(namespace) Revert "UBUNTU: SAUCE: fs: Refuse uid/gid changes which don't map into s_user_ns"
(namespace) fs: Refuse uid/gid changes which don't map into s_user_ns
(namespace) Revert "UBUNTU: SAUCE: fs: Update posix_acl support to handle user namespace mounts"
UBUNTU: SAUCE: (namespace) posix_acl: Export posix_acl_fix_xattr_userns() to modules
UBUNTU: SAUCE: (namespace) fuse: Translate ids in posix acl xattrs
(namespace) Revert "UBUNTU: SAUCE: quota: Require that qids passed to dqget() be valid and map into s_user_ns"
(namespace) Revert "UBUNTU: SAUCE: quota: Convert ids relative to s_user_ns"
(namespace) Revert "UBUNTU: SAUCE: ima/evm: Allow root in s_user_ns to set xattrs"
UBUNTU: SAUCE: (namespace) security/integrity: Harden against malformed xattrs
(namespace) Revert "UBUNTU: SAUCE: fs: Allow superblock owner to change ownership of inodes with unmappable ids"
(namespace) Revert "UBUNTU: SAUCE: fs: Don't remove suid for CAP_FSETID in s_user_ns"
UBUNTU: SAUCE: (namespace) fs: Don't remove suid for CAP_FSETID for userns root
UBUNTU: SAUCE: (namespace) fuse: Allow user namespace mounts by default
drivers/staging/lustre/lustre/mdc/mdc_request.c | 2 +-
fs/9p/acl.c | 2 +-
fs/attr.c | 51 +++++++++----------
fs/fuse/dir.c | 30 +++++++++--
fs/fuse/inode.c | 2 +-
fs/inode.c | 12 ++++-
fs/kernfs/inode.c | 2 -
fs/namei.c | 36 +++++++++++---
fs/namespace.c | 4 --
fs/ocfs2/quota_global.c | 6 +--
fs/posix_acl.c | 61 ++++++++++-------------
fs/proc/base.c | 7 ++-
fs/proc/generic.c | 6 ++-
fs/proc/proc_sysctl.c | 7 ++-
fs/quota/dquot.c | 12 +++--
fs/quota/quota.c | 10 ++--
fs/quota/quota_tree.c | 66 +++++++++----------------
fs/quota/quota_v1.c | 13 +----
fs/quota/quota_v2.c | 43 ++++++----------
fs/super.c | 4 ++
fs/xattr.c | 26 +++++-----
include/linux/dqblk_qtree.h | 4 +-
include/linux/fs.h | 5 ++
include/linux/posix_acl.h | 2 +-
include/linux/posix_acl_xattr.h | 24 ++++-----
include/linux/quota.h | 10 ++++
security/integrity/digsig.c | 2 +-
security/integrity/evm/evm_main.c | 6 ++-
security/integrity/ima/ima_appraise.c | 4 +-
zfs/module/zfs/zpl_xattr.c | 4 +-
30 files changed, 245 insertions(+), 218 deletions(-)
More information about the kernel-team
mailing list